Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-14562 (GCVE-0-2020-14562)
Vulnerability from cvelistv5
Published
2020-07-15 17:34
Modified
2024-09-27 18:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE.
Summary
Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Oracle Corporation | Java |
Version: Java SE: 11.0.7, 14.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:34.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200717-0005/" }, { "name": "FEDORA-2020-5d0b4a2b5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/" }, { "name": "USN-4433-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4433-1/" }, { "name": "DSA-4734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4734" }, { "name": "FEDORA-2020-93cc9c3ef2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/" }, { "name": "openSUSE-SU-2020:1175", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" }, { "name": "openSUSE-SU-2020:1191", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" }, { "name": "GLSA-202008-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202008-24" }, { "name": "GLSA-202209-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-15" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-14562", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T17:53:28.273529Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T18:40:16.398Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Java", "vendor": "Oracle Corporation", "versions": [ { "status": "affected", "version": "Java SE: 11.0.7, 14.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-25T15:06:40", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200717-0005/" }, { "name": "FEDORA-2020-5d0b4a2b5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/" }, { "name": "USN-4433-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4433-1/" }, { "name": "DSA-4734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4734" }, { "name": "FEDORA-2020-93cc9c3ef2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/" }, { "name": "openSUSE-SU-2020:1175", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" }, { "name": "openSUSE-SU-2020:1191", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" }, { "name": "GLSA-202008-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202008-24" }, { "name": "GLSA-202209-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202209-15" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2020-14562", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Java", "version": { "version_data": [ { "version_affected": "=", "version_value": "Java SE: 11.0.7, 14.0.1" } ] } } ] }, "vendor_name": "Oracle Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)." } ] }, "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE." } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200717-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200717-0005/" }, { "name": "FEDORA-2020-5d0b4a2b5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/" }, { "name": "USN-4433-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4433-1/" }, { "name": "DSA-4734", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4734" }, { "name": "FEDORA-2020-93cc9c3ef2", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/" }, { "name": "openSUSE-SU-2020:1175", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" }, { "name": "openSUSE-SU-2020:1191", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" }, { "name": "GLSA-202008-24", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202008-24" }, { "name": "GLSA-202209-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202209-15" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2020-14562", "datePublished": "2020-07-15T17:34:27", "dateReserved": "2020-06-19T00:00:00", "dateUpdated": "2024-09-27T18:40:16.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-14562\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2020-07-15T18:15:21.897\",\"lastModified\":\"2024-11-21T05:03:33.037\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el producto Java SE de Oracle Java SE (componente: ImageIO). Las versiones compatibles que est\u00e1n afectadas son Java SE: 11.0.7 y 14.0.1. La vulnerabilidad explotable f\u00e1cilmente permite a un atacante no autenticado con acceso de red por medio de m\u00faltiples protocolos comprometer a Java SE. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en una capacidad no autorizada de causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Java SE. Nota: Esta vulnerabilidad se aplica a las implementaciones de Java, generalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets de Java en sandbox, que cargan y ejecutan c\u00f3digo no confiable (por ejemplo, c\u00f3digo que proviene de Internet) y conf\u00edan en el sandbox de Java para la seguridad. Esta vulnerabilidad no se aplica a las implementaciones de Java, generalmente en servidores, que cargan y ejecutan solo c\u00f3digo confiable (por ejemplo, c\u00f3digo instalado por parte de un administrador). CVSS 3.1 Puntuaci\u00f3n Base 5.3 (Impactos de la Disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:11.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A0D065C-C4AB-4558-86C3-9A89C9CADBF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:14.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D034E25-195A-4926-9FEC-A2B9F01E0CFC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.50.2\",\"matchCriteriaId\":\"27723C4B-C434-4733-96E4-397AA6ECE601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9CC59D-6182-4B5E-96B5-226FCD343916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB695329-036B-447D-BEB0-AA4D89D1D99C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F148EC-6D6D-4C4F-B57C-CFBCD3D32B41\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"902B8056-9E37-443B-8905-8AA93E2447FB\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://security.gentoo.org/glsa/202008-24\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202209-15\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20200717-0005/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4433-1/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4734\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202008-24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202209-15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20200717-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4433-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4734\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpujul2020.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20200717-0005/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/\", \"name\": \"FEDORA-2020-5d0b4a2b5b\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/4433-1/\", \"name\": \"USN-4433-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2020/dsa-4734\", \"name\": \"DSA-4734\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/\", \"name\": \"FEDORA-2020-93cc9c3ef2\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html\", \"name\": \"openSUSE-SU-2020:1175\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html\", \"name\": \"openSUSE-SU-2020:1191\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202008-24\", \"name\": \"GLSA-202008-24\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202209-15\", \"name\": \"GLSA-202209-15\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T12:46:34.833Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-14562\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-27T17:53:28.273529Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-27T17:54:07.123Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"Java\", \"versions\": [{\"status\": \"affected\", \"version\": \"Java SE: 11.0.7, 14.0.1\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpujul2020.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20200717-0005/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/\", \"name\": \"FEDORA-2020-5d0b4a2b5b\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://usn.ubuntu.com/4433-1/\", \"name\": \"USN-4433-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://www.debian.org/security/2020/dsa-4734\", \"name\": \"DSA-4734\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/\", \"name\": \"FEDORA-2020-93cc9c3ef2\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html\", \"name\": \"openSUSE-SU-2020:1175\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html\", \"name\": \"openSUSE-SU-2020:1191\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://security.gentoo.org/glsa/202008-24\", \"name\": \"GLSA-202008-24\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}, {\"url\": \"https://security.gentoo.org/glsa/202209-15\", \"name\": \"GLSA-202209-15\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2022-09-25T15:06:40\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.1\", \"baseScore\": \"5.3\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Java SE: 11.0.7, 14.0.1\", \"version_affected\": \"=\"}]}, \"product_name\": \"Java\"}]}, \"vendor_name\": \"Oracle Corporation\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.oracle.com/security-alerts/cpujul2020.html\", \"name\": \"https://www.oracle.com/security-alerts/cpujul2020.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20200717-0005/\", \"name\": \"https://security.netapp.com/advisory/ntap-20200717-0005/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/\", \"name\": \"FEDORA-2020-5d0b4a2b5b\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://usn.ubuntu.com/4433-1/\", \"name\": \"USN-4433-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://www.debian.org/security/2020/dsa-4734\", \"name\": \"DSA-4734\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/\", \"name\": \"FEDORA-2020-93cc9c3ef2\", \"refsource\": \"FEDORA\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html\", \"name\": \"openSUSE-SU-2020:1175\", \"refsource\": \"SUSE\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html\", \"name\": \"openSUSE-SU-2020:1191\", \"refsource\": \"SUSE\"}, {\"url\": \"https://security.gentoo.org/glsa/202008-24\", \"name\": \"GLSA-202008-24\", \"refsource\": \"GENTOO\"}, {\"url\": \"https://security.gentoo.org/glsa/202209-15\", \"name\": \"GLSA-202209-15\", \"refsource\": \"GENTOO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE.\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-14562\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secalert_us@oracle.com\"}}}}", "cveMetadata": "{\"cveId\": \"CVE-2020-14562\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-27T18:40:16.398Z\", \"dateReserved\": \"2020-06-19T00:00:00\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2020-07-15T17:34:27\", \"assignerShortName\": \"oracle\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2020:1175-1
Vulnerability from csaf_opensuse
Published
2020-08-09 18:15
Modified
2020-08-09 18:15
Summary
Security update for java-11-openjdk
Notes
Title of the patch
Security update for java-11-openjdk
Description of the patch
This update for java-11-openjdk fixes the following issues:
- Update to upstream tag jdk-11.0.8+10 (July 2020 CPU, bsc#1174157)
* Security fixes:
+ JDK-8230613: Better ASCII conversions
+ JDK-8231800: Better listing of arrays
+ JDK-8232014: Expand DTD support
+ JDK-8233234: Better Zip Naming
+ JDK-8233239, CVE-2020-14562: Enhance TIFF support
+ JDK-8233255: Better Swing Buttons
+ JDK-8234032: Improve basic calendar services
+ JDK-8234042: Better factory production of certificates
+ JDK-8234418: Better parsing with CertificateFactory
+ JDK-8234836: Improve serialization handling
+ JDK-8236191: Enhance OID processing
+ JDK-8236867, CVE-2020-14573: Enhance Graal interface handling
+ JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
+ JDK-8237592, CVE-2020-14577: Enhance certificate verification
+ JDK-8238002, CVE-2020-14581: Better matrix operations
+ JDK-8238013: Enhance String writing
+ JDK-8238804: Enhance key handling process
+ JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
+ JDK-8238843: Enhanced font handing
+ JDK-8238920, CVE-2020-14583: Better Buffer support
+ JDK-8238925: Enhance WAV file playback
+ JDK-8240119, CVE-2020-14593: Less Affine Transformations
+ JDK-8240482: Improved WAV file playback
+ JDK-8241379: Update JCEKS support
+ JDK-8241522: Manifest improved jar headers redux
+ JDK-8242136, CVE-2020-14621: Better XML namespace handling
* Other changes:
+ JDK-6933331: (d3d/ogl) java.lang.IllegalStateException:
Buffers have not been created
+ JDK-7124307: JSpinner and changing value by mouse
+ JDK-8022574: remove HaltNode code after uncommon trap calls
+ JDK-8039082: [TEST_BUG] Test
java/awt/dnd/BadSerializationTest/BadSerializationTest.java
fails
+ JDK-8040630: Popup menus and tooltips flicker with previous
popup contents when first shown
+ JDK-8044365: (dc) MulticastSendReceiveTests.java failing with
ENOMEM when joining group (OS X 10.9)
+ JDK-8048215: [TESTBUG]
java/lang/management/ManagementFactory/ThreadMXBeanProxy.java
Expected non-null LockInfo
+ JDK-8051349: nsk/jvmti/scenarios/sampling/SP06/sp06t003 fails
in nightly
+ JDK-8080353: JShell: Better error message on attempting to
add default method
+ JDK-8139876: Exclude hanging nsk/stress/stack from execution
with deoptimization enabled
+ JDK-8146090: java/lang/ref/ReachabilityFenceTest.java fails
with -XX:+DeoptimizeALot
+ JDK-8153430: jdk regression test MletParserLocaleTest,
ParserInfiniteLoopTest reduce default timeout
+ JDK-8156207: Resource allocated BitMaps are often cleared
unnecessarily
+ JDK-8159740: JShell: corralled declarations do not have
correct source to wrapper mapping
+ JDK-8175984: ICC_Profile has un-needed, not-empty finalize
method
+ JDK-8176359: Frame#setMaximizedbounds not working properly in
multi screen environments
+ JDK-8183369: RFC unconformity of HttpURLConnection with proxy
+ JDK-8187078: -XX:+VerifyOops finds numerous problems when
running JPRT
+ JDK-8189861: Refactor CacheFind
+ JDK-8191169: java/net/Authenticator/B4769350.java failed
intermittently
+ JDK-8191930: [Graal] emits unparseable XML into compile log
+ JDK-8193879: Java debugger hangs on method invocation
+ JDK-8196019: java/awt/Window/Grab/GrabTest.java fails on
Windows
+ JDK-8196181: sun/java2d/GdiRendering/InsetClipping.java fails
+ JDK-8198000:
java/awt/List/EmptyListEventTest/EmptyListEventTest.java
debug assert on Windows
+ JDK-8198001: java/awt/Menu/WrongParentAfterRemoveMenu/
/WrongParentAfterRemoveMenu.java debug assert on Windows
+ JDK-8198339: Test javax/swing/border/Test6981576.java is
unstable
+ JDK-8200701: jdk/jshell/ExceptionsTest.java fails on Windows,
after JDK-8198801
+ JDK-8203264: JNI exception pending in
PlainDatagramSocketImpl.c:740
+ JDK-8203672: JNI exception pending in PlainSocketImpl.c
+ JDK-8203673: JNI exception pending in
DualStackPlainDatagramSocketImpl.c:398
+ JDK-8204834: Fix confusing 'allocate' naming in OopStorage
+ JDK-8205399: Set node color on pinned HashMap.TreeNode
deletion
+ JDK-8205653: test/jdk/sun/management/jmxremote/bootstrap/
/RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with
handshake_failure
+ JDK-8206179: com/sun/management/OperatingSystemMXBean/
/GetCommittedVirtualMemorySize.java fails with Committed
virtual memory size illegal value
+ JDK-8207334: VM times out in VM_HandshakeAllThreads::doit()
with RunThese30M
+ JDK-8208277: Code cache heap (-XX:ReservedCodeCacheSize)
doesn't work with 1GB LargePages
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2020-1175
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.8+10 (July 2020 CPU, bsc#1174157)\n * Security fixes:\n + JDK-8230613: Better ASCII conversions\n + JDK-8231800: Better listing of arrays\n + JDK-8232014: Expand DTD support\n + JDK-8233234: Better Zip Naming\n + JDK-8233239, CVE-2020-14562: Enhance TIFF support\n + JDK-8233255: Better Swing Buttons\n + JDK-8234032: Improve basic calendar services\n + JDK-8234042: Better factory production of certificates\n + JDK-8234418: Better parsing with CertificateFactory\n + JDK-8234836: Improve serialization handling\n + JDK-8236191: Enhance OID processing\n + JDK-8236867, CVE-2020-14573: Enhance Graal interface handling\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior\n + JDK-8237592, CVE-2020-14577: Enhance certificate verification\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n + JDK-8238013: Enhance String writing\n + JDK-8238804: Enhance key handling process\n + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable\n + JDK-8238843: Enhanced font handing\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n + JDK-8238925: Enhance WAV file playback\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n + JDK-8240482: Improved WAV file playback\n + JDK-8241379: Update JCEKS support\n + JDK-8241522: Manifest improved jar headers redux\n + JDK-8242136, CVE-2020-14621: Better XML namespace handling\n * Other changes:\n + JDK-6933331: (d3d/ogl) java.lang.IllegalStateException:\n Buffers have not been created\n + JDK-7124307: JSpinner and changing value by mouse\n + JDK-8022574: remove HaltNode code after uncommon trap calls\n + JDK-8039082: [TEST_BUG] Test\n java/awt/dnd/BadSerializationTest/BadSerializationTest.java\n fails\n + JDK-8040630: Popup menus and tooltips flicker with previous\n popup contents when first shown\n + JDK-8044365: (dc) MulticastSendReceiveTests.java failing with\n ENOMEM when joining group (OS X 10.9)\n + JDK-8048215: [TESTBUG]\n java/lang/management/ManagementFactory/ThreadMXBeanProxy.java\n Expected non-null LockInfo\n + JDK-8051349: nsk/jvmti/scenarios/sampling/SP06/sp06t003 fails\n in nightly\n + JDK-8080353: JShell: Better error message on attempting to\n add default method\n + JDK-8139876: Exclude hanging nsk/stress/stack from execution\n with deoptimization enabled\n + JDK-8146090: java/lang/ref/ReachabilityFenceTest.java fails\n with -XX:+DeoptimizeALot\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n + JDK-8156207: Resource allocated BitMaps are often cleared\n unnecessarily\n + JDK-8159740: JShell: corralled declarations do not have\n correct source to wrapper mapping\n + JDK-8175984: ICC_Profile has un-needed, not-empty finalize\n method\n + JDK-8176359: Frame#setMaximizedbounds not working properly in\n multi screen environments\n + JDK-8183369: RFC unconformity of HttpURLConnection with proxy\n + JDK-8187078: -XX:+VerifyOops finds numerous problems when\n running JPRT\n + JDK-8189861: Refactor CacheFind\n + JDK-8191169: java/net/Authenticator/B4769350.java failed\n intermittently\n + JDK-8191930: [Graal] emits unparseable XML into compile log\n + JDK-8193879: Java debugger hangs on method invocation\n + JDK-8196019: java/awt/Window/Grab/GrabTest.java fails on\n Windows\n + JDK-8196181: sun/java2d/GdiRendering/InsetClipping.java fails\n + JDK-8198000:\n java/awt/List/EmptyListEventTest/EmptyListEventTest.java\n debug assert on Windows\n + JDK-8198001: java/awt/Menu/WrongParentAfterRemoveMenu/\n /WrongParentAfterRemoveMenu.java debug assert on Windows\n + JDK-8198339: Test javax/swing/border/Test6981576.java is\n unstable\n + JDK-8200701: jdk/jshell/ExceptionsTest.java fails on Windows,\n after JDK-8198801\n + JDK-8203264: JNI exception pending in\n PlainDatagramSocketImpl.c:740\n + JDK-8203672: JNI exception pending in PlainSocketImpl.c\n + JDK-8203673: JNI exception pending in\n DualStackPlainDatagramSocketImpl.c:398\n + JDK-8204834: Fix confusing \u0027allocate\u0027 naming in OopStorage\n + JDK-8205399: Set node color on pinned HashMap.TreeNode\n deletion\n + JDK-8205653: test/jdk/sun/management/jmxremote/bootstrap/\n /RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with\n handshake_failure\n + JDK-8206179: com/sun/management/OperatingSystemMXBean/\n /GetCommittedVirtualMemorySize.java fails with Committed\n virtual memory size illegal value\n + JDK-8207334: VM times out in VM_HandshakeAllThreads::doit()\n with RunThese30M\n + JDK-8208277: Code cache heap (-XX:ReservedCodeCacheSize)\n doesn\u0027t work with 1GB LargePages\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1175", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1175-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1175-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1175-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" }, { "category": "self", "summary": "SUSE Bug 1174157", "url": "https://bugzilla.suse.com/1174157" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2020-08-09T18:15:29Z", "generator": { "date": "2020-08-09T18:15:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1175-1", "initial_release_date": "2020-08-09T18:15:29Z", "revision_history": [ { "date": "2020-08-09T18:15:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "product": { "name": "java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "product_id": "java-11-openjdk-11.0.8.0-lp151.3.19.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "product": { "name": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "product_id": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "product": { "name": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "product_id": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "product": { "name": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "product_id": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "product": { "name": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "product_id": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "product": { "name": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "product_id": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "product": { "name": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "product_id": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "product_id": "java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "product": { "name": "java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "product_id": "java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64", "product_id": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.8.0-lp151.3.19.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586" }, "product_reference": "java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586" }, "product_reference": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586" }, "product_reference": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586" }, "product_reference": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586" }, "product_reference": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586" }, "product_reference": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586" }, "product_reference": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-09T18:15:29Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-09T18:15:29Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-09T18:15:29Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-09T18:15:29Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-09T18:15:29Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-09T18:15:29Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-09T18:15:29Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.8.0-lp151.3.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-09T18:15:29Z", "details": "important" } ], "title": "CVE-2020-14621" } ] }
opensuse-su-2024:10871-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
java-11-openjdk-11.0.12.0-3.1 on GA media
Notes
Title of the patch
java-11-openjdk-11.0.12.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the java-11-openjdk-11.0.12.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10871
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-11-openjdk-11.0.12.0-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-11-openjdk-11.0.12.0-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10871", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10871-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2745 page", "url": "https://www.suse.com/security/cve/CVE-2019-2745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2818 page", "url": "https://www.suse.com/security/cve/CVE-2019-2818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2821 page", "url": "https://www.suse.com/security/cve/CVE-2019-2821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2894 page", "url": "https://www.suse.com/security/cve/CVE-2019-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2933 page", "url": "https://www.suse.com/security/cve/CVE-2019-2933/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2945 page", "url": "https://www.suse.com/security/cve/CVE-2019-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2949 page", "url": "https://www.suse.com/security/cve/CVE-2019-2949/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2958 page", "url": "https://www.suse.com/security/cve/CVE-2019-2958/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2962 page", "url": "https://www.suse.com/security/cve/CVE-2019-2962/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2964 page", "url": "https://www.suse.com/security/cve/CVE-2019-2964/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2973 page", "url": "https://www.suse.com/security/cve/CVE-2019-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2975 page", "url": "https://www.suse.com/security/cve/CVE-2019-2975/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2977 page", "url": "https://www.suse.com/security/cve/CVE-2019-2977/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2978 page", "url": "https://www.suse.com/security/cve/CVE-2019-2978/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2981 page", "url": "https://www.suse.com/security/cve/CVE-2019-2981/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2983 page", "url": "https://www.suse.com/security/cve/CVE-2019-2983/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2987 page", "url": "https://www.suse.com/security/cve/CVE-2019-2987/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2988 page", "url": "https://www.suse.com/security/cve/CVE-2019-2988/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2989 page", "url": "https://www.suse.com/security/cve/CVE-2019-2989/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2992 page", "url": "https://www.suse.com/security/cve/CVE-2019-2992/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2999 page", "url": "https://www.suse.com/security/cve/CVE-2019-2999/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2583 page", "url": "https://www.suse.com/security/cve/CVE-2020-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2590 page", "url": "https://www.suse.com/security/cve/CVE-2020-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2593 page", "url": "https://www.suse.com/security/cve/CVE-2020-2593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2601 page", "url": "https://www.suse.com/security/cve/CVE-2020-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2604 page", "url": "https://www.suse.com/security/cve/CVE-2020-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2654 page", "url": "https://www.suse.com/security/cve/CVE-2020-2654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2655 page", "url": "https://www.suse.com/security/cve/CVE-2020-2655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2754 page", "url": "https://www.suse.com/security/cve/CVE-2020-2754/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2755 page", "url": "https://www.suse.com/security/cve/CVE-2020-2755/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2756 page", "url": "https://www.suse.com/security/cve/CVE-2020-2756/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2757 page", "url": "https://www.suse.com/security/cve/CVE-2020-2757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2767 page", "url": "https://www.suse.com/security/cve/CVE-2020-2767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2773 page", "url": "https://www.suse.com/security/cve/CVE-2020-2773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2778 page", "url": "https://www.suse.com/security/cve/CVE-2020-2778/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2781 page", "url": "https://www.suse.com/security/cve/CVE-2020-2781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2800 page", "url": "https://www.suse.com/security/cve/CVE-2020-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2803 page", "url": "https://www.suse.com/security/cve/CVE-2020-2803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2805 page", "url": "https://www.suse.com/security/cve/CVE-2020-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2816 page", "url": "https://www.suse.com/security/cve/CVE-2020-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2830 page", "url": "https://www.suse.com/security/cve/CVE-2020-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-11-openjdk-11.0.12.0-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10871-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2745" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2745", "url": "https://www.suse.com/security/cve/CVE-2019-2745" }, { "category": "external", "summary": "SUSE Bug 1141784 for CVE-2019-2745", "url": "https://bugzilla.suse.com/1141784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2745" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-2818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2818" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2818", "url": "https://www.suse.com/security/cve/CVE-2019-2818" }, { "category": "external", "summary": "SUSE Bug 1141788 for CVE-2019-2818", "url": "https://bugzilla.suse.com/1141788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2818" }, { "cve": "CVE-2019-2821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2821" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2821", "url": "https://www.suse.com/security/cve/CVE-2019-2821" }, { "category": "external", "summary": "SUSE Bug 1141781 for CVE-2019-2821", "url": "https://bugzilla.suse.com/1141781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2821" }, { "cve": "CVE-2019-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2894" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2894", "url": "https://www.suse.com/security/cve/CVE-2019-2894" }, { "category": "external", "summary": "SUSE Bug 1152856 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1152856" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2894" }, { "cve": "CVE-2019-2933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2933" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2933", "url": "https://www.suse.com/security/cve/CVE-2019-2933" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2933" }, { "cve": "CVE-2019-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2945" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2945", "url": "https://www.suse.com/security/cve/CVE-2019-2945" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2945" }, { "cve": "CVE-2019-2949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2949" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2949", "url": "https://www.suse.com/security/cve/CVE-2019-2949" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2949" }, { "cve": "CVE-2019-2958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2958" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2958", "url": "https://www.suse.com/security/cve/CVE-2019-2958" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2958" }, { "cve": "CVE-2019-2962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2962" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2962", "url": "https://www.suse.com/security/cve/CVE-2019-2962" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2962" }, { "cve": "CVE-2019-2964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2964" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2964", "url": "https://www.suse.com/security/cve/CVE-2019-2964" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2964" }, { "cve": "CVE-2019-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2973", "url": "https://www.suse.com/security/cve/CVE-2019-2973" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2973" }, { "cve": "CVE-2019-2975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2975" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2975", "url": "https://www.suse.com/security/cve/CVE-2019-2975" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2975" }, { "cve": "CVE-2019-2977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2977" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2977", "url": "https://www.suse.com/security/cve/CVE-2019-2977" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2977", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2977" }, { "cve": "CVE-2019-2978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2978" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2978", "url": "https://www.suse.com/security/cve/CVE-2019-2978" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2978" }, { "cve": "CVE-2019-2981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2981" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2981", "url": "https://www.suse.com/security/cve/CVE-2019-2981" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2981" }, { "cve": "CVE-2019-2983", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2983" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2983", "url": "https://www.suse.com/security/cve/CVE-2019-2983" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2983" }, { "cve": "CVE-2019-2987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2987" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2987", "url": "https://www.suse.com/security/cve/CVE-2019-2987" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2987", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2987" }, { "cve": "CVE-2019-2988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2988" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2988", "url": "https://www.suse.com/security/cve/CVE-2019-2988" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2988" }, { "cve": "CVE-2019-2989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2989" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2989", "url": "https://www.suse.com/security/cve/CVE-2019-2989" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2989" }, { "cve": "CVE-2019-2992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2992" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2992", "url": "https://www.suse.com/security/cve/CVE-2019-2992" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2992" }, { "cve": "CVE-2019-2999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2999" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2999", "url": "https://www.suse.com/security/cve/CVE-2019-2999" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2999" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7317" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2020-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2583", "url": "https://www.suse.com/security/cve/CVE-2020-2583" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2583" }, { "cve": "CVE-2020-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2590" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2590", "url": "https://www.suse.com/security/cve/CVE-2020-2590" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2590", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2590" }, { "cve": "CVE-2020-2593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2593", "url": "https://www.suse.com/security/cve/CVE-2020-2593" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2593" }, { "cve": "CVE-2020-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2601" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2601", "url": "https://www.suse.com/security/cve/CVE-2020-2601" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2601", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2604" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2604", "url": "https://www.suse.com/security/cve/CVE-2020-2604" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1162972" }, { "category": "external", "summary": "SUSE Bug 1165863 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1165863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2604" }, { "cve": "CVE-2020-2654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2654" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2654", "url": "https://www.suse.com/security/cve/CVE-2020-2654" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2655" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2655", "url": "https://www.suse.com/security/cve/CVE-2020-2655" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2655", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2655" }, { "cve": "CVE-2020-2754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2754" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2754", "url": "https://www.suse.com/security/cve/CVE-2020-2754" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2754" }, { "cve": "CVE-2020-2755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2755" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2755", "url": "https://www.suse.com/security/cve/CVE-2020-2755" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2756" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2756", "url": "https://www.suse.com/security/cve/CVE-2020-2756" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2757" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2757", "url": "https://www.suse.com/security/cve/CVE-2020-2757" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2767" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2767", "url": "https://www.suse.com/security/cve/CVE-2020-2767" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2767", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2767" }, { "cve": "CVE-2020-2773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2773" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2773", "url": "https://www.suse.com/security/cve/CVE-2020-2773" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2773", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2778", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2778" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2778", "url": "https://www.suse.com/security/cve/CVE-2020-2778" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2778", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2778" }, { "cve": "CVE-2020-2781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2781", "url": "https://www.suse.com/security/cve/CVE-2020-2781" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2800", "url": "https://www.suse.com/security/cve/CVE-2020-2800" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2803", "url": "https://www.suse.com/security/cve/CVE-2020-2803" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2805" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2805", "url": "https://www.suse.com/security/cve/CVE-2020-2805" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2816", "url": "https://www.suse.com/security/cve/CVE-2020-2816" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2816", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2816" }, { "cve": "CVE-2020-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2830" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2830", "url": "https://www.suse.com/security/cve/CVE-2020-2830" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2830" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2020:1191-1
Vulnerability from csaf_opensuse
Published
2020-08-12 10:24
Modified
2020-08-12 10:24
Summary
Security update for java-11-openjdk
Notes
Title of the patch
Security update for java-11-openjdk
Description of the patch
This update for java-11-openjdk fixes the following issues:
- Update to upstream tag jdk-11.0.8+10 (July 2020 CPU, bsc#1174157)
* Security fixes:
+ JDK-8230613: Better ASCII conversions
+ JDK-8231800: Better listing of arrays
+ JDK-8232014: Expand DTD support
+ JDK-8233234: Better Zip Naming
+ JDK-8233239, CVE-2020-14562: Enhance TIFF support
+ JDK-8233255: Better Swing Buttons
+ JDK-8234032: Improve basic calendar services
+ JDK-8234042: Better factory production of certificates
+ JDK-8234418: Better parsing with CertificateFactory
+ JDK-8234836: Improve serialization handling
+ JDK-8236191: Enhance OID processing
+ JDK-8236867, CVE-2020-14573: Enhance Graal interface handling
+ JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
+ JDK-8237592, CVE-2020-14577: Enhance certificate verification
+ JDK-8238002, CVE-2020-14581: Better matrix operations
+ JDK-8238013: Enhance String writing
+ JDK-8238804: Enhance key handling process
+ JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
+ JDK-8238843: Enhanced font handing
+ JDK-8238920, CVE-2020-14583: Better Buffer support
+ JDK-8238925: Enhance WAV file playback
+ JDK-8240119, CVE-2020-14593: Less Affine Transformations
+ JDK-8240482: Improved WAV file playback
+ JDK-8241379: Update JCEKS support
+ JDK-8241522: Manifest improved jar headers redux
+ JDK-8242136, CVE-2020-14621: Better XML namespace handling
* Other changes:
+ JDK-6933331: (d3d/ogl) java.lang.IllegalStateException:
Buffers have not been created
+ JDK-7124307: JSpinner and changing value by mouse
+ JDK-8022574: remove HaltNode code after uncommon trap calls
+ JDK-8039082: [TEST_BUG] Test
java/awt/dnd/BadSerializationTest/BadSerializationTest.java
fails
+ JDK-8040630: Popup menus and tooltips flicker with previous
popup contents when first shown
+ JDK-8044365: (dc) MulticastSendReceiveTests.java failing with
ENOMEM when joining group (OS X 10.9)
+ JDK-8048215: [TESTBUG]
java/lang/management/ManagementFactory/ThreadMXBeanProxy.java
Expected non-null LockInfo
+ JDK-8051349: nsk/jvmti/scenarios/sampling/SP06/sp06t003 fails
in nightly
+ JDK-8080353: JShell: Better error message on attempting to
add default method
+ JDK-8139876: Exclude hanging nsk/stress/stack from execution
with deoptimization enabled
+ JDK-8146090: java/lang/ref/ReachabilityFenceTest.java fails
with -XX:+DeoptimizeALot
+ JDK-8153430: jdk regression test MletParserLocaleTest,
ParserInfiniteLoopTest reduce default timeout
+ JDK-8156207: Resource allocated BitMaps are often cleared
unnecessarily
+ JDK-8159740: JShell: corralled declarations do not have
correct source to wrapper mapping
+ JDK-8175984: ICC_Profile has un-needed, not-empty finalize
method
+ JDK-8176359: Frame#setMaximizedbounds not working properly in
multi screen environments
+ JDK-8183369: RFC unconformity of HttpURLConnection with proxy
+ JDK-8187078: -XX:+VerifyOops finds numerous problems when
running JPRT
+ JDK-8189861: Refactor CacheFind
+ JDK-8191169: java/net/Authenticator/B4769350.java failed
intermittently
+ JDK-8191930: [Graal] emits unparseable XML into compile log
+ JDK-8193879: Java debugger hangs on method invocation
+ JDK-8196019: java/awt/Window/Grab/GrabTest.java fails on
Windows
+ JDK-8196181: sun/java2d/GdiRendering/InsetClipping.java fails
+ JDK-8198000:
java/awt/List/EmptyListEventTest/EmptyListEventTest.java
debug assert on Windows
+ JDK-8198001: java/awt/Menu/WrongParentAfterRemoveMenu/
/WrongParentAfterRemoveMenu.java debug assert on Windows
+ JDK-8198339: Test javax/swing/border/Test6981576.java is
unstable
+ JDK-8200701: jdk/jshell/ExceptionsTest.java fails on Windows,
after JDK-8198801
+ JDK-8203264: JNI exception pending in
PlainDatagramSocketImpl.c:740
+ JDK-8203672: JNI exception pending in PlainSocketImpl.c
+ JDK-8203673: JNI exception pending in
DualStackPlainDatagramSocketImpl.c:398
+ JDK-8204834: Fix confusing 'allocate' naming in OopStorage
+ JDK-8205399: Set node color on pinned HashMap.TreeNode
deletion
+ JDK-8205653: test/jdk/sun/management/jmxremote/bootstrap/
/RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with
handshake_failure
+ JDK-8206179: com/sun/management/OperatingSystemMXBean/
/GetCommittedVirtualMemorySize.java fails with Committed
virtual memory size illegal value
+ JDK-8207334: VM times out in VM_HandshakeAllThreads::doit()
with RunThese30M
+ JDK-8208277: Code cache heap (-XX:ReservedCodeCacheSize)
doesn't work with 1GB LargePages
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2020-1191
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.8+10 (July 2020 CPU, bsc#1174157)\n * Security fixes:\n + JDK-8230613: Better ASCII conversions\n + JDK-8231800: Better listing of arrays\n + JDK-8232014: Expand DTD support\n + JDK-8233234: Better Zip Naming\n + JDK-8233239, CVE-2020-14562: Enhance TIFF support\n + JDK-8233255: Better Swing Buttons\n + JDK-8234032: Improve basic calendar services\n + JDK-8234042: Better factory production of certificates\n + JDK-8234418: Better parsing with CertificateFactory\n + JDK-8234836: Improve serialization handling\n + JDK-8236191: Enhance OID processing\n + JDK-8236867, CVE-2020-14573: Enhance Graal interface handling\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior\n + JDK-8237592, CVE-2020-14577: Enhance certificate verification\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n + JDK-8238013: Enhance String writing\n + JDK-8238804: Enhance key handling process\n + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable\n + JDK-8238843: Enhanced font handing\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n + JDK-8238925: Enhance WAV file playback\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n + JDK-8240482: Improved WAV file playback\n + JDK-8241379: Update JCEKS support\n + JDK-8241522: Manifest improved jar headers redux\n + JDK-8242136, CVE-2020-14621: Better XML namespace handling\n * Other changes:\n + JDK-6933331: (d3d/ogl) java.lang.IllegalStateException:\n Buffers have not been created\n + JDK-7124307: JSpinner and changing value by mouse\n + JDK-8022574: remove HaltNode code after uncommon trap calls\n + JDK-8039082: [TEST_BUG] Test\n java/awt/dnd/BadSerializationTest/BadSerializationTest.java\n fails\n + JDK-8040630: Popup menus and tooltips flicker with previous\n popup contents when first shown\n + JDK-8044365: (dc) MulticastSendReceiveTests.java failing with\n ENOMEM when joining group (OS X 10.9)\n + JDK-8048215: [TESTBUG]\n java/lang/management/ManagementFactory/ThreadMXBeanProxy.java\n Expected non-null LockInfo\n + JDK-8051349: nsk/jvmti/scenarios/sampling/SP06/sp06t003 fails\n in nightly\n + JDK-8080353: JShell: Better error message on attempting to\n add default method\n + JDK-8139876: Exclude hanging nsk/stress/stack from execution\n with deoptimization enabled\n + JDK-8146090: java/lang/ref/ReachabilityFenceTest.java fails\n with -XX:+DeoptimizeALot\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n + JDK-8156207: Resource allocated BitMaps are often cleared\n unnecessarily\n + JDK-8159740: JShell: corralled declarations do not have\n correct source to wrapper mapping\n + JDK-8175984: ICC_Profile has un-needed, not-empty finalize\n method\n + JDK-8176359: Frame#setMaximizedbounds not working properly in\n multi screen environments\n + JDK-8183369: RFC unconformity of HttpURLConnection with proxy\n + JDK-8187078: -XX:+VerifyOops finds numerous problems when\n running JPRT\n + JDK-8189861: Refactor CacheFind\n + JDK-8191169: java/net/Authenticator/B4769350.java failed\n intermittently\n + JDK-8191930: [Graal] emits unparseable XML into compile log\n + JDK-8193879: Java debugger hangs on method invocation\n + JDK-8196019: java/awt/Window/Grab/GrabTest.java fails on\n Windows\n + JDK-8196181: sun/java2d/GdiRendering/InsetClipping.java fails\n + JDK-8198000:\n java/awt/List/EmptyListEventTest/EmptyListEventTest.java\n debug assert on Windows\n + JDK-8198001: java/awt/Menu/WrongParentAfterRemoveMenu/\n /WrongParentAfterRemoveMenu.java debug assert on Windows\n + JDK-8198339: Test javax/swing/border/Test6981576.java is\n unstable\n + JDK-8200701: jdk/jshell/ExceptionsTest.java fails on Windows,\n after JDK-8198801\n + JDK-8203264: JNI exception pending in\n PlainDatagramSocketImpl.c:740\n + JDK-8203672: JNI exception pending in PlainSocketImpl.c\n + JDK-8203673: JNI exception pending in\n DualStackPlainDatagramSocketImpl.c:398\n + JDK-8204834: Fix confusing \u0027allocate\u0027 naming in OopStorage\n + JDK-8205399: Set node color on pinned HashMap.TreeNode\n deletion\n + JDK-8205653: test/jdk/sun/management/jmxremote/bootstrap/\n /RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with\n handshake_failure\n + JDK-8206179: com/sun/management/OperatingSystemMXBean/\n /GetCommittedVirtualMemorySize.java fails with Committed\n virtual memory size illegal value\n + JDK-8207334: VM times out in VM_HandshakeAllThreads::doit()\n with RunThese30M\n + JDK-8208277: Code cache heap (-XX:ReservedCodeCacheSize)\n doesn\u0027t work with 1GB LargePages\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1191", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1191-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1191-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1191-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" }, { "category": "self", "summary": "SUSE Bug 1174157", "url": "https://bugzilla.suse.com/1174157" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2020-08-12T10:24:14Z", "generator": { "date": "2020-08-12T10:24:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1191-1", "initial_release_date": "2020-08-12T10:24:14Z", "revision_history": [ { "date": "2020-08-12T10:24:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "product": { "name": "java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "product_id": "java-11-openjdk-11.0.8.0-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "product": { "name": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "product_id": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "product": { "name": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "product_id": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "product": { "name": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "product_id": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "product": { "name": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "product_id": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "product": { "name": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "product_id": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "product": { "name": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "product_id": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "product_id": "java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "product": { "name": "java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "product_id": "java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64", "product_id": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.8.0-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586" }, "product_reference": "java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586" }, "product_reference": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586" }, "product_reference": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586" }, "product_reference": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586" }, "product_reference": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586" }, "product_reference": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586" }, "product_reference": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-12T10:24:14Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-12T10:24:14Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-12T10:24:14Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-12T10:24:14Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-12T10:24:14Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-12T10:24:14Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-12T10:24:14Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.8.0-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-12T10:24:14Z", "details": "important" } ], "title": "CVE-2020-14621" } ] }
opensuse-su-2024:10872-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
java-13-openjdk-13.0.8.0-3.1 on GA media
Notes
Title of the patch
java-13-openjdk-13.0.8.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the java-13-openjdk-13.0.8.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10872
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-13-openjdk-13.0.8.0-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-13-openjdk-13.0.8.0-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10872", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10872-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2745 page", "url": "https://www.suse.com/security/cve/CVE-2019-2745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2818 page", "url": "https://www.suse.com/security/cve/CVE-2019-2818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2821 page", "url": "https://www.suse.com/security/cve/CVE-2019-2821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2894 page", "url": "https://www.suse.com/security/cve/CVE-2019-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2933 page", "url": "https://www.suse.com/security/cve/CVE-2019-2933/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2945 page", "url": "https://www.suse.com/security/cve/CVE-2019-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2949 page", "url": "https://www.suse.com/security/cve/CVE-2019-2949/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2958 page", "url": "https://www.suse.com/security/cve/CVE-2019-2958/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2962 page", "url": "https://www.suse.com/security/cve/CVE-2019-2962/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2964 page", "url": "https://www.suse.com/security/cve/CVE-2019-2964/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2973 page", "url": "https://www.suse.com/security/cve/CVE-2019-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2975 page", "url": "https://www.suse.com/security/cve/CVE-2019-2975/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2977 page", "url": "https://www.suse.com/security/cve/CVE-2019-2977/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2978 page", "url": "https://www.suse.com/security/cve/CVE-2019-2978/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2981 page", "url": "https://www.suse.com/security/cve/CVE-2019-2981/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2983 page", "url": "https://www.suse.com/security/cve/CVE-2019-2983/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2987 page", "url": "https://www.suse.com/security/cve/CVE-2019-2987/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2988 page", "url": "https://www.suse.com/security/cve/CVE-2019-2988/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2989 page", "url": "https://www.suse.com/security/cve/CVE-2019-2989/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2992 page", "url": "https://www.suse.com/security/cve/CVE-2019-2992/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2999 page", "url": "https://www.suse.com/security/cve/CVE-2019-2999/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2583 page", "url": "https://www.suse.com/security/cve/CVE-2020-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2590 page", "url": "https://www.suse.com/security/cve/CVE-2020-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2593 page", "url": "https://www.suse.com/security/cve/CVE-2020-2593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2601 page", "url": "https://www.suse.com/security/cve/CVE-2020-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2604 page", "url": "https://www.suse.com/security/cve/CVE-2020-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2654 page", "url": "https://www.suse.com/security/cve/CVE-2020-2654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2655 page", "url": "https://www.suse.com/security/cve/CVE-2020-2655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2754 page", "url": "https://www.suse.com/security/cve/CVE-2020-2754/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2755 page", "url": "https://www.suse.com/security/cve/CVE-2020-2755/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2756 page", "url": "https://www.suse.com/security/cve/CVE-2020-2756/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2757 page", "url": "https://www.suse.com/security/cve/CVE-2020-2757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2767 page", "url": "https://www.suse.com/security/cve/CVE-2020-2767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2773 page", "url": "https://www.suse.com/security/cve/CVE-2020-2773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2778 page", "url": "https://www.suse.com/security/cve/CVE-2020-2778/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2781 page", "url": "https://www.suse.com/security/cve/CVE-2020-2781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2800 page", "url": "https://www.suse.com/security/cve/CVE-2020-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2803 page", "url": "https://www.suse.com/security/cve/CVE-2020-2803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2805 page", "url": "https://www.suse.com/security/cve/CVE-2020-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2816 page", "url": "https://www.suse.com/security/cve/CVE-2020-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2830 page", "url": "https://www.suse.com/security/cve/CVE-2020-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-13-openjdk-13.0.8.0-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10872-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2745" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2745", "url": "https://www.suse.com/security/cve/CVE-2019-2745" }, { "category": "external", "summary": "SUSE Bug 1141784 for CVE-2019-2745", "url": "https://bugzilla.suse.com/1141784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2745" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-2818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2818" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2818", "url": "https://www.suse.com/security/cve/CVE-2019-2818" }, { "category": "external", "summary": "SUSE Bug 1141788 for CVE-2019-2818", "url": "https://bugzilla.suse.com/1141788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2818" }, { "cve": "CVE-2019-2821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2821" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2821", "url": "https://www.suse.com/security/cve/CVE-2019-2821" }, { "category": "external", "summary": "SUSE Bug 1141781 for CVE-2019-2821", "url": "https://bugzilla.suse.com/1141781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2821" }, { "cve": "CVE-2019-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2894" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2894", "url": "https://www.suse.com/security/cve/CVE-2019-2894" }, { "category": "external", "summary": "SUSE Bug 1152856 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1152856" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2894" }, { "cve": "CVE-2019-2933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2933" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2933", "url": "https://www.suse.com/security/cve/CVE-2019-2933" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2933" }, { "cve": "CVE-2019-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2945" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2945", "url": "https://www.suse.com/security/cve/CVE-2019-2945" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2945" }, { "cve": "CVE-2019-2949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2949" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2949", "url": "https://www.suse.com/security/cve/CVE-2019-2949" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2949" }, { "cve": "CVE-2019-2958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2958" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2958", "url": "https://www.suse.com/security/cve/CVE-2019-2958" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2958" }, { "cve": "CVE-2019-2962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2962" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2962", "url": "https://www.suse.com/security/cve/CVE-2019-2962" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2962" }, { "cve": "CVE-2019-2964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2964" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2964", "url": "https://www.suse.com/security/cve/CVE-2019-2964" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2964" }, { "cve": "CVE-2019-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2973", "url": "https://www.suse.com/security/cve/CVE-2019-2973" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2973" }, { "cve": "CVE-2019-2975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2975" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2975", "url": "https://www.suse.com/security/cve/CVE-2019-2975" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2975" }, { "cve": "CVE-2019-2977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2977" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2977", "url": "https://www.suse.com/security/cve/CVE-2019-2977" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2977", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2977" }, { "cve": "CVE-2019-2978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2978" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2978", "url": "https://www.suse.com/security/cve/CVE-2019-2978" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2978" }, { "cve": "CVE-2019-2981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2981" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2981", "url": "https://www.suse.com/security/cve/CVE-2019-2981" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2981" }, { "cve": "CVE-2019-2983", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2983" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2983", "url": "https://www.suse.com/security/cve/CVE-2019-2983" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2983" }, { "cve": "CVE-2019-2987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2987" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2987", "url": "https://www.suse.com/security/cve/CVE-2019-2987" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2987", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2987" }, { "cve": "CVE-2019-2988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2988" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2988", "url": "https://www.suse.com/security/cve/CVE-2019-2988" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2988" }, { "cve": "CVE-2019-2989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2989" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2989", "url": "https://www.suse.com/security/cve/CVE-2019-2989" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2989" }, { "cve": "CVE-2019-2992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2992" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2992", "url": "https://www.suse.com/security/cve/CVE-2019-2992" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2992" }, { "cve": "CVE-2019-2999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2999" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2999", "url": "https://www.suse.com/security/cve/CVE-2019-2999" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2999" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7317" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2020-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2583", "url": "https://www.suse.com/security/cve/CVE-2020-2583" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2583" }, { "cve": "CVE-2020-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2590" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2590", "url": "https://www.suse.com/security/cve/CVE-2020-2590" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2590", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2590" }, { "cve": "CVE-2020-2593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2593", "url": "https://www.suse.com/security/cve/CVE-2020-2593" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2593" }, { "cve": "CVE-2020-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2601" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2601", "url": "https://www.suse.com/security/cve/CVE-2020-2601" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2601", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2604" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2604", "url": "https://www.suse.com/security/cve/CVE-2020-2604" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1162972" }, { "category": "external", "summary": "SUSE Bug 1165863 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1165863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2604" }, { "cve": "CVE-2020-2654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2654" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2654", "url": "https://www.suse.com/security/cve/CVE-2020-2654" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2655" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2655", "url": "https://www.suse.com/security/cve/CVE-2020-2655" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2655", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2655" }, { "cve": "CVE-2020-2754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2754" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2754", "url": "https://www.suse.com/security/cve/CVE-2020-2754" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2754" }, { "cve": "CVE-2020-2755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2755" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2755", "url": "https://www.suse.com/security/cve/CVE-2020-2755" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2756" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2756", "url": "https://www.suse.com/security/cve/CVE-2020-2756" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2757" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2757", "url": "https://www.suse.com/security/cve/CVE-2020-2757" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2767" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2767", "url": "https://www.suse.com/security/cve/CVE-2020-2767" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2767", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2767" }, { "cve": "CVE-2020-2773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2773" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2773", "url": "https://www.suse.com/security/cve/CVE-2020-2773" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2773", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2778", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2778" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2778", "url": "https://www.suse.com/security/cve/CVE-2020-2778" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2778", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2778" }, { "cve": "CVE-2020-2781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2781", "url": "https://www.suse.com/security/cve/CVE-2020-2781" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2800", "url": "https://www.suse.com/security/cve/CVE-2020-2800" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2803", "url": "https://www.suse.com/security/cve/CVE-2020-2803" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2805" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2805", "url": "https://www.suse.com/security/cve/CVE-2020-2805" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2816", "url": "https://www.suse.com/security/cve/CVE-2020-2816" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2816", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2816" }, { "cve": "CVE-2020-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2830" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2830", "url": "https://www.suse.com/security/cve/CVE-2020-2830" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2830" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2024:10873-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
java-15-openjdk-15.0.4.0-2.1 on GA media
Notes
Title of the patch
java-15-openjdk-15.0.4.0-2.1 on GA media
Description of the patch
These are all security issues fixed in the java-15-openjdk-15.0.4.0-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10873
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-15-openjdk-15.0.4.0-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-15-openjdk-15.0.4.0-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10873", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10873-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-15-openjdk-15.0.4.0-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10873-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
rhsa-2020:3098
Vulnerability from csaf_redhat
Published
2020-07-22 12:35
Modified
2024-11-22 14:59
Summary
Red Hat Security Advisory: java-11-openjdk security update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)
* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)
* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)\n\n* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)\n\n* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)\n\n* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)\n\n* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)\n\n* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)\n\n* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3098", "url": "https://access.redhat.com/errata/RHSA-2020:3098" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3098.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security update", "tracking": { "current_release_date": "2024-11-22T14:59:02+00:00", "generator": { "date": "2024-11-22T14:59:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:3098", "initial_release_date": "2020-07-22T12:35:32+00:00", "revision_history": [ { "date": "2020-07-22T12:35:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-22T12:35:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:59:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.src", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.src", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_0.src", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856896" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "RHBZ#1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14556", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)" }, { "cve": "CVE-2020-14562", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856810" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "RHBZ#1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)" }, { "cve": "CVE-2020-14573", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856951" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "RHBZ#1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14573", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)" }, { "cve": "CVE-2020-14577", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856988" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "RHBZ#1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14577", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)" }, { "cve": "CVE-2020-14583", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856448" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "RHBZ#1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14583", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)" }, { "cve": "CVE-2020-14593", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856784" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "RHBZ#1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14593", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)" }, { "cve": "CVE-2020-14621", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856885" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "RHBZ#1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14621", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)" } ] }
rhsa-2020_3098
Vulnerability from csaf_redhat
Published
2020-07-22 12:35
Modified
2024-11-22 14:59
Summary
Red Hat Security Advisory: java-11-openjdk security update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)
* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)
* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)\n\n* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)\n\n* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)\n\n* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)\n\n* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)\n\n* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)\n\n* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3098", "url": "https://access.redhat.com/errata/RHSA-2020:3098" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3098.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security update", "tracking": { "current_release_date": "2024-11-22T14:59:02+00:00", "generator": { "date": "2024-11-22T14:59:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:3098", "initial_release_date": "2020-07-22T12:35:32+00:00", "revision_history": [ { "date": "2020-07-22T12:35:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-22T12:35:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:59:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.8.10-0.el8_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.src", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.src", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_0.src", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856896" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "RHBZ#1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14556", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)" }, { "cve": "CVE-2020-14562", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856810" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "RHBZ#1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)" }, { "cve": "CVE-2020-14573", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856951" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "RHBZ#1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14573", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)" }, { "cve": "CVE-2020-14577", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856988" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "RHBZ#1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14577", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)" }, { "cve": "CVE-2020-14583", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856448" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "RHBZ#1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14583", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)" }, { "cve": "CVE-2020-14593", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856784" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "RHBZ#1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14593", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)" }, { "cve": "CVE-2020-14621", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856885" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "RHBZ#1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14621", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-22T12:35:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3098" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.src", "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.8.10-0.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.8.10-0.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)" } ] }
RHSA-2020:2970
Vulnerability from csaf_redhat
Published
2020-07-16 08:54
Modified
2024-11-22 14:58
Summary
Red Hat Security Advisory: java-11-openjdk security and enhancement update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)
* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)
* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Enhancement(s):
* Add -static-libs subpackage with statically linked OpenJDK libraries (BZ#1848701)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)\n\n* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)\n\n* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)\n\n* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)\n\n* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)\n\n* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)\n\n* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nEnhancement(s):\n\n* Add -static-libs subpackage with statically linked OpenJDK libraries (BZ#1848701)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2970", "url": "https://access.redhat.com/errata/RHSA-2020:2970" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2970.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security and enhancement update", "tracking": { "current_release_date": "2024-11-22T14:58:46+00:00", "generator": { "date": "2024-11-22T14:58:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2970", "initial_release_date": "2020-07-16T08:54:55+00:00", "revision_history": [ { "date": "2020-07-16T08:54:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-16T08:54:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:58:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.src", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.src", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856896" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "RHBZ#1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14556", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)" }, { "cve": "CVE-2020-14562", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856810" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "RHBZ#1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)" }, { "cve": "CVE-2020-14573", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856951" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "RHBZ#1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14573", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)" }, { "cve": "CVE-2020-14577", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856988" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "RHBZ#1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14577", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)" }, { "cve": "CVE-2020-14583", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856448" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "RHBZ#1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14583", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)" }, { "cve": "CVE-2020-14593", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856784" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "RHBZ#1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14593", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)" }, { "cve": "CVE-2020-14621", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856885" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "RHBZ#1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14621", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)" } ] }
RHSA-2020:2969
Vulnerability from csaf_redhat
Published
2020-07-16 09:40
Modified
2024-11-22 14:58
Summary
Red Hat Security Advisory: java-11-openjdk security update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)
* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)
* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)\n\n* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)\n\n* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)\n\n* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)\n\n* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)\n\n* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)\n\n* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2969", "url": "https://access.redhat.com/errata/RHSA-2020:2969" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2969.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security update", "tracking": { "current_release_date": "2024-11-22T14:58:54+00:00", "generator": { "date": "2024-11-22T14:58:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2969", "initial_release_date": "2020-07-16T09:40:51+00:00", "revision_history": [ { "date": "2020-07-16T09:40:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-16T09:40:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:58:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856896" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "RHBZ#1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14556", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)" }, { "cve": "CVE-2020-14562", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856810" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "RHBZ#1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)" }, { "cve": "CVE-2020-14573", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856951" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "RHBZ#1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14573", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)" }, { "cve": "CVE-2020-14577", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856988" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "RHBZ#1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14577", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)" }, { "cve": "CVE-2020-14583", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856448" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "RHBZ#1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14583", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)" }, { "cve": "CVE-2020-14593", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856784" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "RHBZ#1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14593", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)" }, { "cve": "CVE-2020-14621", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856885" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "RHBZ#1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14621", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)" } ] }
rhsa-2020:2969
Vulnerability from csaf_redhat
Published
2020-07-16 09:40
Modified
2024-11-22 14:58
Summary
Red Hat Security Advisory: java-11-openjdk security update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)
* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)
* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)\n\n* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)\n\n* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)\n\n* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)\n\n* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)\n\n* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)\n\n* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2969", "url": "https://access.redhat.com/errata/RHSA-2020:2969" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2969.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security update", "tracking": { "current_release_date": "2024-11-22T14:58:54+00:00", "generator": { "date": "2024-11-22T14:58:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2969", "initial_release_date": "2020-07-16T09:40:51+00:00", "revision_history": [ { "date": "2020-07-16T09:40:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-16T09:40:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:58:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el7_8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Client-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Server-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.src", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "relates_to_product_reference": "7Workstation-optional-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856896" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "RHBZ#1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14556", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)" }, { "cve": "CVE-2020-14562", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856810" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "RHBZ#1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)" }, { "cve": "CVE-2020-14573", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856951" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "RHBZ#1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14573", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)" }, { "cve": "CVE-2020-14577", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856988" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "RHBZ#1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14577", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)" }, { "cve": "CVE-2020-14583", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856448" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "RHBZ#1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14583", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)" }, { "cve": "CVE-2020-14593", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856784" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "RHBZ#1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14593", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)" }, { "cve": "CVE-2020-14621", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856885" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "RHBZ#1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14621", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14621" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T09:40:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Client-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Client-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7ComputeNode-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7ComputeNode-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Server-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Server-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.src", "7Workstation-optional-7.8.Z:java-11-openjdk-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-debuginfo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-demo-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-devel-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-headless-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-jmods-1:11.0.8.10-0.el7_8.x86_64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.i686", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.ppc64le", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.s390x", "7Workstation-optional-7.8.Z:java-11-openjdk-src-1:11.0.8.10-0.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)" } ] }
rhsa-2020:2970
Vulnerability from csaf_redhat
Published
2020-07-16 08:54
Modified
2024-11-22 14:58
Summary
Red Hat Security Advisory: java-11-openjdk security and enhancement update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)
* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)
* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Enhancement(s):
* Add -static-libs subpackage with statically linked OpenJDK libraries (BZ#1848701)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)\n\n* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)\n\n* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)\n\n* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)\n\n* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)\n\n* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)\n\n* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nEnhancement(s):\n\n* Add -static-libs subpackage with statically linked OpenJDK libraries (BZ#1848701)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2970", "url": "https://access.redhat.com/errata/RHSA-2020:2970" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "1856885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856885" }, { "category": "external", "summary": "1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2970.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security and enhancement update", "tracking": { "current_release_date": "2024-11-22T14:58:46+00:00", "generator": { "date": "2024-11-22T14:58:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2970", "initial_release_date": "2020-07-16T08:54:55+00:00", "revision_history": [ { "date": "2020-07-16T08:54:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-16T08:54:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:58:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.8.10-0.el8_2?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.src", "product": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.src", "product_id": "java-11-openjdk-1:11.0.8.10-0.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.8.10-0.el8_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856896" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "RHBZ#1856896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14556", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14556" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)" }, { "cve": "CVE-2020-14562", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856810" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "RHBZ#1856810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14562" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)" }, { "cve": "CVE-2020-14573", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856951" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "RHBZ#1856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856951" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14573", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14573" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)" }, { "cve": "CVE-2020-14577", "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856988" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "RHBZ#1856988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14577", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14577" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)" }, { "cve": "CVE-2020-14583", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856448" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "RHBZ#1856448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856448" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14583", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14583" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2970" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)" }, { "cve": "CVE-2020-14593", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856784" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "RHBZ#1856784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14593", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14593" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-16T08:54:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.8.10-0.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.8.10-0.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:java-11-openj